3.4.3.Weekly challenge 4 - sj50179/Google-Data-Analytics-Professional-Certificate GitHub Wiki

LATEST SUBMISSION GRADE 100%

Question 1

Fill in the blank: File-naming conventions are _____ that describe a file's content, creation date, or version.

  • common verifications
  • frequent suggestions
  • general attributes
  • consistent guidelines

Correct. File-naming conventions are consistent guidelines that describe a file's content, creation date, or version.

Question 2

A data analytics team uses data about data to indicate consistent naming conventions for a project. What type of data is involved in this scenario?

  • Long data
  • Metadata
  • Big data
  • Aggregated data

Correct. Metadata is data about data. Metadata practices can help analytics teams create consistent naming conventions and storage practices for their files.

Question 3

A data analyst creates a file that lists people who donated to their organization’s fund drive. An effective name for the file is FundDriveDonors_20210216_V01.

  • True
  • False

Correct. FundDriveDonors_20210216_V03 is an effective file name because it is an appropriate length and references the project name, creation date, version.

Question 4

What process do data analysts use to keep project-related files together and organize them into subfolders?

  • Foldering
  • Naming
  • Encrypting
  • Editing

Correct. Data analysts use foldering to keep project-related files together and organize them into subfolders.

Question 5

Data analysts use archiving to separate current from past work. What does this process involve?

  • Moving files from completed projects to another location
  • Using secure data-erase software to destroy old files
  • Reorganizing and renaming current files
  • Reviewing current data files to confirm they’ve been cleaned

Correct. Archiving involves moving files from completed projects to a separate location.

Question 6

Fill in the blank: Data analysts create _____ to structure their folders.

  • sequences
  • hierarchies
  • scales
  • ladders

Correct. Data analysts create hierarchies to structure their folders.

Question 7

Using encryption to protect data is an example of what?

  • Data integrity
  • Data ethics
  • Data security
  • Data validation

Correct. Using encryption to protect data is an example of data security.

Question 8

A data analyst creates a spreadsheet with five tabs. They want to share the data in tabs 1-4 with a client. Tab 5 contains private information about other clients. Which of the following tactics will enable them to keep tab 5 private? Select all that apply.

  • Rename tab 5 to include the word “private” then share the spreadsheet with the client.
  • Make a copy of the spreadsheet, delete tab 5, then share the new file with the client.
  • Hide tab 5, then share the spreadsheet with the client.
  • Copy tabs 1-4 into a separate spreadsheet, then share the new file with the client.

Correct. Copying tabs 1-4 into a separate spreadsheet, then sharing the new file with the client will keep tab 5 private. In addition, making a copy of the spreadsheet, deleting tab 5, then sharing the new file with the client will keep tab 5 private.